Quantcast
Channel: MACHN1k » Linux
Browsing all 6 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Google Hijack – Pt. Two; Session Hijack in Nine Minutes

Purpose: Perform a session hijacking attack Description:Use gathered information to carry out a session hijacking attack on a Google account through a local network, using one blogger account to...

View Article



Image may be NSFW.
Clik here to view.

Google Hijack – Pt. One; The Process

Purpose:  Establish goals for session hijacking Description:  Thought process and reconnaissance of performing a web based session hijacking attack on a local network. My Thinking Recently I had...

View Article

Image may be NSFW.
Clik here to view.

SSH Remote Tunneling

The following will demonstrate the setup of an OpenSSH box, which will be enabled for remote connections. Reasoning for SSH Instead of bogging down a laptop or other local machine with tools and memory...

View Article

Image may be NSFW.
Clik here to view.

Metasploit & distcc Exploitation, Part 01

Distcc distcc is a daemon process distributes compilation of C code across several machines on a network. It is also vulnerable. Part 01 of this article will deal with the exploitation process of...

View Article

Image may be NSFW.
Clik here to view.

Metasploit & distcc Exploitation, Part 02

A system has been compromised, but that’s only a small part in the grand scheme of exploitation. Metasploit’s post modules exist to gather credentials, configuration files, etc. from a compromised...

View Article


Image may be NSFW.
Clik here to view.

Simplify Bash; .bash_aliases

Make Life Less Bashful What’s below will demonstrate the use of a .bash_aliases file. This could possibly brighten one’s day for years straight. Bash Profile Aliases: This sources ~/.bash_aliases to...

View Article
Browsing all 6 articles
Browse latest View live




Latest Images